基于聚類分析的動(dòng)態(tài)自適應(yīng)入侵檢測(cè)模式研究
[Abstract]:With the continuous improvement of the network infrastructure and the increasing richness of the network application, the convenience and efficiency of the network application make people learn, live and work more on the network, such as enterprise management, electronic commerce and so on. Large amounts of data need to be safely stored and transmitted to ensure confidentiality, integrity, and availability. The higher the dependence on network application, the greater the loss of network application system once it is damaged. The existing network application system is an open system. On the one hand, it meets the need of information sharing, on the other hand, this openness provides the possibility for hackers to launch attacks. Hackers can take advantage of various security vulnerabilities in complex interconnected networks and host systems to attack organizations and individuals to a certain extent. The existing network application security protection system can not ensure that there are no vulnerabilities in the whole system, so intrusion detection system plays a very important role in network security and is a necessary supplement to network security protection. The existing research on intrusion detection is not sufficient. The research in this paper is produced under this background, and it is very meaningful. This paper first introduces the concept and development of intrusion detection, introduces the existing international intrusion detection standard recommendations, intrusion detection commonly used technical means, and classifies intrusion detection from different angles. Then it introduces the application of data mining algorithm which can be used in intrusion detection, analyzes its advantages and disadvantages, and analyzes the types and features of intrusion existing in the network. Finally, the detection mode proposed in this paper is described in detail, including the whole process of intrusion detection mode, the selection of intrusion detection attribute subset, the method of data preprocessing and the clustering algorithm for intrusion detection. The test model proposed in this paper is verified and analyzed experimentally. The existing research of intrusion detection based on clustering analysis mostly enhances the effect of intrusion detection by improved clustering algorithm, and does not make full use of the known intrusion feature information. In fact, we already have a lot of characteristic information about the type of intrusion we know. These improved clustering algorithms often have high space and time complexity due to the assumption that they do not know the detected data features completely. This feature is unable to adapt to the increasingly high network bandwidth and intrusion detection environment with large amount of detected data. Based on the analysis of intrusion features, an attribute set selection method for intrusion detection is proposed in this paper. Then, a new intrusion detection model is designed, which makes full use of the various types of center vectors obtained from the computation of the existing intrusion information as the initial clustering center of the improved K-Means algorithm. It effectively solves the problem that the initial clustering center of K-Means algorithm itself is difficult to determine, which may lead to local optimization, and ensures the conciseness of the algorithm. Because the known types of center vectors can well represent the distribution of the detected data, the detection mode has a better convergence and can meet the increasing bandwidth requirements of the existing network. When the new unknown intrusion type is detected, the intrusion detection rule base should be updated in time, so that the dynamic detection effect of this detection mode can adapt to the changing network intrusion environment. It is proved by experiments that this detection model is effective, which can detect a specific intrusion type, and can effectively find new intrusion types that may appear.
【學(xué)位授予單位】:太原理工大學(xué)
【學(xué)位級(jí)別】:碩士
【學(xué)位授予年份】:2013
【分類號(hào)】:TP311.13;TP393.08
【參考文獻(xiàn)】
相關(guān)期刊論文 前10條
1 羅敏,王麗娜,張煥國(guó);基于無監(jiān)督聚類的入侵檢測(cè)方法[J];電子學(xué)報(bào);2003年11期
2 杜強(qiáng);孫敏;;基于改進(jìn)聚類分析算法的入侵檢測(cè)系統(tǒng)研究[J];計(jì)算機(jī)工程與應(yīng)用;2011年11期
3 余祥宣,盧剛;CIDF的組件通信分析和算法描述[J];計(jì)算機(jī)工程;2002年05期
4 何波;程勇軍;涂飛;楊武;;自適應(yīng)入侵檢測(cè)專家系統(tǒng)模型[J];計(jì)算機(jī)工程;2007年10期
5 張亞玲;康立錦;;基于數(shù)據(jù)挖掘的Snort系統(tǒng)改進(jìn)模型[J];計(jì)算機(jī)應(yīng)用;2009年02期
6 王令劍;滕少華;;聚類和時(shí)間序列分析在入侵檢測(cè)中的應(yīng)用[J];計(jì)算機(jī)應(yīng)用;2010年03期
7 王翠娥;于曉明;;網(wǎng)格和密度聚類算法在入侵檢測(cè)中的應(yīng)用[J];計(jì)算機(jī)應(yīng)用;2010年11期
8 謝慧;吳曉平;張志剛;王李民;;基于蟻群聚類的入侵檢測(cè)技術(shù)研究[J];計(jì)算機(jī)應(yīng)用研究;2010年08期
9 李濤;;基于數(shù)據(jù)挖掘技術(shù)的自適應(yīng)入侵檢測(cè)系統(tǒng)模型[J];計(jì)算機(jī)工程與設(shè)計(jì);2010年06期
10 唐湘滟;朱幸輝;盛立新;陳曉珍;程杰仁;;基于IDMEF的信息安全事件標(biāo)準(zhǔn)化模型研究[J];網(wǎng)絡(luò)安全技術(shù)與應(yīng)用;2011年05期
,本文編號(hào):2177691
本文鏈接:http://www.sikaile.net/guanlilunwen/ydhl/2177691.html